Abstract— Network security engineers work to keep services available all the time by handling intruder attacks. Intrusion Detection System (IDS) is one of the obtainable mechanism that used to sense and classify any abnormal actions. Therefore, the…
In this paper, popular routing protocols for Wireless Sensor Networks (WSNs) are studied. There are many issues and challenges that effect routing of data. First, high energy is consumed which reduces network lifetime. Second, security of routing…
Considering that application’s security is an important aspect, especially nowadays with the increase in technology and the number of fraudsters. It should be noted that determining the security of an application is a difficult task, especially since…
Considering that application security is an important aspect, especially nowadays with the increase in technology and the number of fraudsters. It should be noted that determining the security of an application is a difficult task, especially since…
Dyslexia is a problem that an individual has since birth; it poses difficulties for the rest of their life, similar to other learning disabilities. Spelling, writing, reading and in certain instances speech can all be undermined by the language…
The traditional learning process used in schools is outdated. Students nowadays spend most of their time using technologies for entertainment and to communicate with their friends. Technology can also be used to present opportunities in teaching…
Technology plays a major role in our daily lives. In healthcare, technology assists in treating and detecting diseases and can improve patients’ quality of life. Alzheimer’s disease patients are generally elderly people who suffer from disabilities…
One of the techniques used in information security is the concealment technique, where the information to be hidden within another information medium to be saved in the process of messaging between two sides without detection. In this paper, an…
Currently, cloud computing is facing different types of threats whether from inside or outside its environment. This may cause cloud to be crashed or at least unable to provide services to the requests made by clients. In this paper, a new technique…
Nowadays, individuals and organizations areincreasinglytargeted by phishing attacks,soan accurate phishing detectionsystemisrequired. Therefore, many phishing detection techniques have been proposed as well as phishing datasets have been collected.…